[CIVN-2025-0153] Multiple Vulnerabilities in VMware products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in VMware products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
VMware ESXi 8.0, 7.0
VMware Cloud Foundation 5.x, 4.5.x, 9.0.0.0
VMware Workstation 17.x
VMware Fusion 13.x
VMware Tools 11.x-13.x
VMware vSphere Foundation 9.0.0.0
Overview
Multiple vulnerabilities have been reported in VMware products, which could allow a remote attacker to execute arbitrary code on the targeted system.
Target Audience:
Enterprises and large organizations, cloud service providers, and industries with IT environments utilizing VMware products.
Risk Assessment:
High risk of sensitive data exposure and arbitrary code execution.
Impact Assessment:
Potential for host system compromise through virtual machine escape.
Description
VMware provides virtualization software solutions that enable organizations to create and manage virtual machines (VMs), allowing multiple operating systems to run on a single physical machine.
These vulnerabilities affect VMware products due to an integer overflow in the VMXNET3 virtual network adapter, an integer underflow in VMCI (Virtual Machine Communication Interface), a heap-based buffer overflow in the PVSCSI (Paravirtualized SCSI) controller, and the use of uninitialized memory in vSockets. An attacker with local administrative privileges within a guest virtual machine could exploit these vulnerabilities to execute arbitrary code on the host system.
Successful exploitation of these vulnerabilities could allow a local attacker to achieve code execution on the underlying host, leading to potential system compromise.
Solution
Apply appropriate updates as mentioned by the vendor.
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877
References
Vmware
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877
CVE Name
CVE-2025-41236
CVE-2025-41237
CVE-2025-41238
CVE-2025-41239
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=N4zR
—–END PGP SIGNATURE—–